Вы находитесь на странице: 1из 23

CYBER TERRORISM

Cyber Terrorism is an idea whose time has surely come !


coined by computer whiz

Barry C. Collin.

Definition

A criminal act perpetrated by the use of computers an telecommunication capabilities resulting in violence, destruction and/or disruption of services to create fear within a given population with a goal of influencing a government or population to conform to a particular political, social or ideological agenda.

- Barry C. Collin.

The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives.

Can all CYBER CRIMES be called as CYBER TERRORISM ?

Not Really

Production & supply chains Military complexes Government operations Emergency services

Telecommunications Electric grids Transportation networks Banking & finance Water supply

WITNESSES
Ethnic Tamil Guerrillas U.S. Chinese conflicts IGIA Shutdown South Pole Israel Syria Few Others

ETHNIC TAMIL GUERRILLAS 1998


Ethnic Tamil Guerrillas swamped Sri Lankan embassies with 800 emails a day over 2 weeks
"We are the Internet Black Tigers and we're doing this to disrupt your communications."

First known attack by terrorists against a country's computer systems

US CHINESE CONFLICTS
May 7TH , 1999

NATO bombing of Yugoslavia, 5 bombs hits Chinese embassy in Belgrade

Though apologised by President Bill Clinton, Chinese government claims that the bombing was a deliberate act and the operation was an illegal war by NATO

Behind the scenes

An ATTACK FOLDER Belgrade Warehouse 1 was circulated for command approval

Originated within the CIA, described the target as a warehouse for a Yugoslav government agency.

In this form, the strike was approved by President Clinton.

Later

NATO computers were hit with DOS


Blasted with e-mail bombs containing viruses from other European countries.

IGI SHUTDOWN
Few months ago

TECHNICAL SNAG had hit operations at T3 - terminal at Indira Gandhi International Airport (IGIA).

malicious code sent from a remote location to breach the security at the airport.

attack scripts, i.e. a programme was written by an expert to exploit the systems security weakness

Functioning

Check-in counters, Transfers counters and Boarding gates at the IGI are operated using the Common Use Passengers Processing System (CUPPS)
It operates on a common software-and-hardware platform that integrates all information such as an airlines reservation system, the expected time of departure and the capacity at waiting lounges.

The problem in CUPPS started at 2.30 am on June 29

Someone had hacked into the main server of the CUPPS and introduced a virus
12 hours for the experts from ARINC, Wipro and DIAL to restore the systems We found that there were serious security lapses, - CBI official

SOUTH POLE
May 3rd, 2003
Ive hacked into the server of your South Pole Research Station, Pay me off, or I will sell the stations data to another country. This is a message from earth to earth, do you copy?

The hacked computer controlled the life support systems for the South Pole Station that housed 58 scientists wintering over during the South Pole's most dangerous season. - Justice Department report

Two Romanian citizens accused of hacking Arrested

ISRAEL SYRIA
September 5TH , 2007

In 2006, Israel found that the Syria is developing a Nuclear Bomb.


They TROJANIZED the laptop of the official.

How did the non-stealthy F-15s and F-16s get through the Syrian air defence radars without being detected?

U.S. officials say they have the answer

U.S.-developed Suter, an airborne network attack system developed by BAE Systems and integrated into U.S. unmanned aircraft by L-3 Communications was used by the Israelis.

Suter airborne network attack system

Allows to invade communications networks, see what enemy sensors see and even take over as systems administrator so sensors can be manipulated into positions

Few Others

Anonymous successfully hacked the neo-Nazi website and published the database of 16000 Finns Citizens. Phone masters, headed by Jonathan Bosanac of California called as The Gatsby, gained access to telephone networks (such as MCI, WorldCom, Sprint, and AT&T), creditreporting databases(such as Equifax), and even the FBIs own National Crime Information Centre.

More recently, in May 2007 Estonia was subjected to a mass cyber-attack by hackers inside the Russian Federation .

After April 2001 collision of US navy spy plane and Chinese fighter jet, Chinese hackers launched Denial of Service (DoS) attacks against American web sites.

As Brazil popped USA to host the Olympics in 2016, the main power grid of the country crashed plunging more than half of Brazil into complete darkness, made millions to suffer.
Investigation revealed that the national grid had become short of 14,000 megawatts suddenly, leading to the blackout. Cyber security experts concluded that this is the result of sophisticated cyber attacks by hackers.

An invasion by armies can be resisted but not an idea whose time has come. In fact, nothing is more powerful than an idea whose time has come.
Lets watch out _ the next act of terrorism may not involve a BOMB but a BYTE...!!

The time of cyber terrorism has come..!!

Due to GUIDED MISSILES, by MISGUIDED MEN

Its Just The Beginning!!!

Вам также может понравиться